Vol 11, Issue 7,July/ 2020
ISSN NO: 0377-9254
           IOT BASED SHUTTER ALARM SECURITY SYSTEM
                    SHAIK YASMIN SULTHANA*1 SHAIK ALTHAF HUSSAIN*2
       1, Student, Dept of Computer Science Engineering, A1 Global Institute of Engineering &
                                       Technology AP, India.
       2 Assist Professor, Computer Science Engineering, A1 Global Institute of Engineering &
                                       Technology AP, India.
   ABSTRACT:
   An unauthorized entry in to the Bungalows, Banks and warehouses by breaking open the Shutter
   is the most common modus operandi noticed in the case of theft, loot, robbery and riots. Till very
   recently we had no direct solution for this and we had to depend entirely on the security guards.
   As we all know due to its centralized nature & dependence on individuals such security system
   has never been so effective. Protection of Shops, God owns etc. has always been a point of great
   worry & pain for the owners. Shutter Alarm provides solution for present problem. Shutter Alarm
   is a typically designed tailor-made safety device for the total protection of unauthorized entry into
   your Shops, Go down etc. by breaking open the shutter, even by few inches. Now, we may surprise
   to how our Shutter Alarm Security System can interact with you while we are miles away. Well,
   the unit comprises of a control panel device, which can wirelessly communicate with our GSM in
   Cell phone. Therefore, the intruder and thieves can’t tamper with it, and various sirens and sensors
   are connection to the central control device as well.
   1.0 INTRODUCTION
   The Security nowadays had become one of the major and important problem in private institutions
   in which certain security structures have been proposed and transferred to some set of processes.
   The Security frameworks are essential to guarantee data, ownership and the desire for theft or
   terrible behavior. From server features to banks, security frameworks are essential. IOT is a course
   of action for physical materials, tools, structures, vehicles, and various objects that have been
   introduced from sensors and system configurations that leverage the use of hardware and software
   to collect business information.
   Internet of things (IOT):
   The Internet of Things can be represented as the relationship of physical things or electronic
   objects or software programming, detection circuits, and allows openness to circulate information
   between a product, employees, or tools related to the Internet of Things or in an instant called IOT.
   In general, the IOT authorizes items to be distinguished and controlled in a circular fashion across
   the foundations of the current system, creating open avenues for progressive direct coordination
   of the material world in PC-based structures, and an acknowledgment of improved productivity,
   accuracy and cash-related breath.
                                       Fig 1.1 Internet of things
www.jespublication.com                                                                    Page No:1035
                                                                          Vol 11, Issue 7,July/ 2020
                                                                          ISSN NO: 0377-9254
          The tool can be anything related to the Internet and has the information that need to
           access the cloud.
        Devices can perceive application requests.
        The devices themselves are surprisingly separate with the IoT organization with a
           recognizable choice code for that tool.
        Devices must be selected before they can communicate with the IoT.
   Managed and unmanaged options with the devices
   In general, the managed devices which represented as tools that contain the president of an
   association. The Link Master is a great hypothesis that enables syringes to collaborate with the IoT
   Device Management Association through device management display technologies. Tools
   supervised by can perform on-board functions including region strengthening, firmware download
   and restore, rebooting, and factory reset care.
   Applications
        The application is everything that has to do with the Internet and the needs to cooperate
           with the information of the alternatives and the control, in addition to directing these
           tools to a great extent.
        You view the applications in IOT using the API key and the unique application ID.
        Applications must not be selected before they can interact with the IOT Foundation.
   Proposed system
   The proposed system is installed or displayed at the base of the screen. For the proposed system,
   Installation time only takes 15-20 minutes for any shutter. The base and chassis have full access
   to the door sensor attached to the door. If a broken screen switch tries to break the screen, the
   sensor is released, frames start and alarm sounds, and at the same time you can get the connection
   from your side with reliable reconnect and SMS messages through the unit GSM to which the
   ESP8266 wifi adheres. We provide shade safety frames resist tes, our deeply configurable
   structures adapt to other manufactured sensors and our Android applications are interchangeable
   with other security architectures such as Honeywell, Zicon, ADT, etc.
   Advantages of the proposed system
      First of all the proposed system will be highly secured system
      Siren with versatile alert when opening the screen.
      Easy to render on any screen.
      Very solid against impact.
   System analysis
   The existence of the company's mind is investigated at this point and a critical understanding is
   provided with a comprehensive mission strategy and two interpretations. During the evaluation of
   the system, the accessibility of the proposed system is evaluated. This is to ensure that the proposed
   system is not a membership heap. To evaluate practical application, an idea of the massive needs
   of the system is necessary.
   Three main aspects that needs to be covered in the feasibility study are as follows,
        Technical Feasibility
        Economic Feasibility
        Social Feasibility
www.jespublication.com                                                                     Page No:1036
                                                                           Vol 11, Issue 7,July/ 2020
                                                                           ISSN NO: 0377-9254
   Technical feasibility
   This feasibility is carried out to verify the specific sensitivity, that is, the basic requirements
   identified for the system. No system should have an interest in open open assets. This will increase
   the high demands for accessible free assets. This will result in large customer orders being placed.
   The manufactured system must be in urgent need, as minor or fundamentally invalid changes are
   required to implement this system.
   Economic feasibility
   This feasibility is carried out to verify the financial impact that the system will have on the
   association. The degree of emptiness with which affiliation can fill the imaginary work of the
   regime is limited. The uses must be legalized. Since the requirements are also in the system also
   designed within the spending plan, this has been refined in light of the fact that, with a remote
   possibility, most of the improvements used are directly accessible. Basically you have to buy
   things.
   Social feasibility
   Finally the social feasibility is to verify the degree of insistence of the system by the client. This
   links the path to customer readiness to use the system productively. The customer should not feel
   vulnerable by the system, but remember it as a need. The degree of guarantee of the client depends
   exclusively on the techniques used to guide the client on the system and familiarize him. Her
   confirmation must be high, so she is willing to carry out some support tests, which are invited,
   since she is the last client of the system.
   Hardware components and its description
   The section quickly explains about the mission hardware implementation. Talk about the structure
   and workflow of a work path with the help of a square diagram, a circuit diagram, and a detailed
   illustration of the shape of the circle. Highlights, time, scheduling, progressive correspondence,
   ESP8266. It comparatively illustrates the units used in this task.
                                           Fig. Block Diagram
   Entry sensors (everything often referred to as a photoelectric or infrared section, electrical safety
   entry edges, a door sign, electrical converging edges, or an electrician) is a lifting device that sees
   a traveler or something on the door that protects the entrances from closing (Respond is usually
   shown). If an individual or item irritates the entrance and senses the individual or object, then the
   portal revives and remains open and will not close until the individual steps away or the item is
   ejected from the door
   Working process of Door sensor
   Door sensors mostly come in two separate pieces. One piece fits on the door or window, while its
   accessory is attached to the edge of the window. The national security of the United States does
   not require any additional mechanical assembly to establish itself. Depending on your trend, liberal
www.jespublication.com                                                                     Page No:1037
                                                                             Vol 11, Issue 7,July/ 2020
                                                                             ISSN NO: 0377-9254
   base glue will hold the sensors in place. If you need sensors, they can be horribly horrible in the
   rays or around the window for extra help, ignoring how decent they are. Actually put the sensor
   pieces together, keeping in mind how they interact when moving a door or window. Sensors use
   attractive fields to track progress between a door or window and an edge. When disconnected, for
   example, when the door or window is opened, the sensors give a hint to the alert panel. The council
   will evaluate the condition and inform you of the unusual improvement in your home. If a burglary
   event should arise, a professionally supervised home security system will contact the nearest crisis
   center for assistance.
   Access to the GSM network:
   To get to the GSM Associations, the client needs three things:
          The fault relationship for the PDA officer. This generally occurs when associations are
           paid for the time they take (prepayment) or when invoices are sent and settled after the
           association is spent (postpaid).
        A remote control suitable for the GSM system and works similarly to the official one.
           Most phone affiliates sell phones from unacceptable manufacturers.
        A personal support unit (SIM card), which is required by the administrator once the
           stimulus relationship has been established. After starting, the card is changed using the
           MSISDN number (phone number). Certain data, for example, measures to contact loved
           ones on a SIM card, can be handled by the certification authority.
   System Design:
   Software design is in the specific part of the software construction process and is applied by
   pushing a little to the perspective of progress and location of use. The arrangement is the primary
   stage in the progression stage of anything or organized system. The designer is likely to design a
   model or illustration of a component to be collected later. Initially, when the platform is resolved
   and detached, the system order is the first of three specific activities: the structure, code, and testing
   required to collect and commit programs.
   The necessary can be connected to the word "quality". Preparation is developing a quality place in
   program improvement. The configuration gives us images of programs that can evaluate the
   quality. Configuration is the primary way in which we can accurately understand a customer's
   opinion of a final software or system.
   System Architecture
                                        Figure: Architecture design
www.jespublication.com                                                                        Page No:1038
                                                                       Vol 11, Issue 7,July/ 2020
                                                                       ISSN NO: 0377-9254
   Use case Diagram
                   Figure: Use case diagram for shutter alarm security system.
   IMPLEMENTATION
   The implementation phase is one of the important phases for any project. is the time of the task
   when the theoretical structure is changed to a working system. Therefore, it can be considered the
   most important stage to achieve a new profitable system and to bestow on the customer, ensuring
   that the new system works and amazes. The implementation phase incorporates a careful analysis,
   evaluation of the current system and its objectives in the implementation, provision of strategies
   to achieve the transformation and evaluation of the transformation techniques.
       Providing Shutter Lock
       Warning alert With Alarm
       Passing Message to GSM
   Provide shutter lock
   The store / publishing center owner will continually impact the screen. We need to turn on the
   system and use the door lock sensor that is connected to the shade base to identify the open and
   close screen. The door lock sensors have a switch and a magnet, which makes the circuit closed.
   If someone opens a tight shutter, the magnet detaches from the switch, which breaks the circuit
   and trips.
   SYSTEM IMPLEMENTATION
      Here in the below the Arduino tool is a Popular Software, combines project management,
   source code Editing, Program Debugging and powerful environment.
www.jespublication.com                                                                 Page No:1039
                                                                   Vol 11, Issue 7,July/ 2020
                                                                   ISSN NO: 0377-9254
                      Figure: Opening the Arduino tool from the Start menu.
                            Figure: Opening a project in Arduino Tool
   CREATING A NEW PROJECT
         For Creating a New Project click on the Tools click on New File
                Fig. Creating a New Project click on the Tools click on New File
   WRITING THE SOURCE CODE
   Developing source code using Arduino Tool
www.jespublication.com                                                              Page No:1040
                                                                    Vol 11, Issue 7,July/ 2020
                                                                    ISSN NO: 0377-9254
                       Figure: Developing source code using Arduino Tool
   SAVING THE CODE:
                                     Figure: Saving the Code
   ASSEMBLING
   To convert your program to machine language click on arrow mark which is provided in Toolbar.
   Click on arrow mark icon in the Toolbar.
                                       Figure: Upload Code
                   The below table represents the testing phase of the project
www.jespublication.com                                                             Page No:1041
                                                                           Vol 11, Issue 7,July/ 2020
                                                                           ISSN NO: 0377-9254
     TEST CASE        CONDITION               EXPECTED               OBSERVED             RESULT
                      BEING                   RESULT                 RESULT
                      CHECKED
     Door       Lock Check whether the        Door lock sensor       Observed that door Pass
     sensor          door lock sensor         should be attached     sensor is attached
                     which is attached to     to the shutter for     to the shutter for
                     the shutter touching     providing security     providing security.
                     the ground or not        by identifying the
                                              status   of    the
                                              shutter.
     ESP WIFI         Check      when the     ESP should get the     Observed       that Pass
                      shutter   breaks then   status of shutter      information      of
                      the       information   lock as opened         shutter    opening
                      passes    to ESP or     when unauthorized      status is received
                      not.                    persons breaks the     by ESP.
                                              shutter.
     GSM Module       Check whether it Message or sms Observed          that Pass
                      receives         should be sent to Message sent to the
                      information from owner.            owner.
                      ESP and sends
                      message to the
                      owner.
     Buzzer Module     Check     whether      Buzzer should give     Observed         that Pass
                      Buzzer gives alarm      an alarm as an alert   buzzer gives alarm
                      When shutter is         to the owner, when     as an alert to the
                      opened.                 the shutter is open.   owner,         when
                                                                     shutter is open.
     Panic button     Check        when When         pressed Got alarm sound by Pass
                      pressed gets alarm should get alarm pressing
                      sound and sms      and sms to owner
                                 Table. 6.1 Test cases of pass condition
     TEST           CONDITION BEING EXPECTED                         OBSERVED             RESULT
     CASE           CHECKED         RESULT                           RESULT
     Door Lock Check whether the               Door lock sensor      Observed that door Fail
     sensor    door lock sensor which          should        be      sensor    is   not
               is attached to the              attached to the       attached to the
               shutter touching the            shutter      for      shutter         for
               ground or not                   providing             providing security.
                                               security      by
www.jespublication.com                                                                     Page No:1042
                                                                    Vol 11, Issue 7,July/ 2020
                                                                    ISSN NO: 0377-9254
                                          identifying   the
                                          status of     the
                                          shutter.
     ESP WIFI    Check when the shutter   ESP should get      Observed       that Fail
                 breaks    then    the    the status of       information      of
                 information passes to    shutter lock as     shutter    opening
                 ESP or not.              opened       when   status    is    not
                                          unauthorized        received by ESP.
                                          persons breaks
                                          the shutter.
     GSM         Check whether it Message should Observed              that fail
     Module      receives information be sent to owner. Message is not
                 from ESP and sends                     sent to the owner.
                 message to the owner.
     Buzzer       Check whether Buzzer Buzzer should          Observed        that fail
     Module      gives alarm When give an alarm as            buzzer did not give
                 shutter is opened.    an alert to the        alarm as an alert to
                                       owner, when the        the owner, when
                                       shutter is open.       shutter is open.
     Panic button Check when pressed By        pressing Did not get alarm Fail
                  gets alarm sound and should get alarm sound by pressing
                  message              sound and SMS
   OUTPUT RESULT:
                           Figure: Connections of The door sensor
www.jespublication.com                                                              Page No:1043
                                                                         Vol 11, Issue 7,July/ 2020
                                                                         ISSN NO: 0377-9254
                                  Figure: Output of the door sensor
                                 Figure: Message Send to The Mobile
   CONCLUSION
   As per the conclusion, it is clear the present project had been implemented and developed
   successfully. The present project have its own unique features as the name suggests that after
   putting the system on any unauthorized entry can be restricted or our valuables property can be
   protected the hooter went on immediately upon any entry. This will prevent theft by sounds of
   hooter, Which not only tries to prevent the theft and loot and it takes the necessary steps like
   informing the nearby police station as well as after buzzing loud siren, so that it can reach at the
   place before anything major incident happened at the places such as commercial places or homes.
   FUTURE SCOPE
   There is always place for improvement and future scope. There are several features those will be
   integrated in the future aiming to solve many problems and advancements. The features to be
   integrated in future are a camera is to be fixed outside the shutter and record the entry of intruder
   and make the video as MMS to the owner. The other feature is to make an android application and
   frequently check the status of the shutter. The final one is the impact detection sensor, which is
www.jespublication.com                                                                    Page No:1044
                                                                      Vol 11, Issue 7,July/ 2020
                                                                      ISSN NO: 0377-9254
   capable of detecting any kind of physical impact made on the shutter and an alarm on the owner’s
   mobile device.
   REFERENCES
   1. Huang H, Xiao S, Meng X, Xiong Y (2010) A Remote Home Security System Based on
   Wireless Sensor Network and GSM Technology, Second Int. Conf. on Networks Security,
   Wireless Communications and Trusted Computing.
   2. Zhu A, Lin P, Cheng S (2012) Design and Realization of Home Appliances Control System
   Based on The Android Smartphone, IEEE Int. Conf. on Control Engineering and Communication
   Technology.
   3. Rana GMSM, Khan AAM, Hoque MN, Mitul AF (2013) Design and Implementation of a GSM
   Based remote home security and appliance control system, in Proc. IEEE Int. Conf. on Advances
   in Electrical Engineering.
   4. Sharma RK, Ayub Mohammad, Kalita H, Kalita D (2014) Android Interface based GSM Home
   Security System, IEEE, Inter. Conf. on Issues and Challenges in Intelligent Computing
   Techniques.
   5. Teymourzadeh R, Ahmed SA, Chan KW, Hoong MV (2013) Smart GSM Based Home
   Automation System, IEEE Conf. on Systems, Process & Control (ICSPC2013), Kuala Lumpur,
   Malaysia.
www.jespublication.com                                                               Page No:1045